<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://hacking.ac</loc><changefreq>always</changefreq><priority>1</priority><lastmod>2026-01-09T10:00:57.582Z</lastmod></url><url><loc>https://hacking.ac/docs/introduction/welcome-to-hackingac</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/sauna</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/monteverde</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/timelapse</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/return</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/cascade</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/flight</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/blackfield</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/cicada</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/active</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/forest</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/ad-and-networks/thefrizz</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/jerry</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/netmon</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/servmon</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/chatterbox</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/jeeves</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/sniper</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/querier</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/giddy</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/arctic</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/remote</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/buff</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/love</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/secnotes</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/access</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/oscp-practices/windows/mailing</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/htb/proving-ground</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/whoami-groups</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/smbmap</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/smbclient</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/rpcclient</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/nxc</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/ldapsearch</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/kerbrute</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/nmap</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/lookupsid</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/1-recon-and-enumeration/showmount</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/2-web-discovery</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/2-web-discovery/ffuf</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/2-web-discovery/wfuzz</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/2-web-discovery/feroxbuster</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/rubeus</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/responder</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/nettheft</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/dcsync</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/get-msolcredentialsps1</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/getnpuser</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/john</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/getuserspns</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/username-anarchy</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/secretsdump</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/vncpwd</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/3-credential-attacks/pypykatz</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/4-active-directory-attacks</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/4-active-directory-attacks/bloodhound</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/4-active-directory-attacks/bloodyad</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.458Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/4-active-directory-attacks/certipy-ad</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/4-active-directory-attacks/crackmapexec</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/5-lateral-movement</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/5-lateral-movement/runascs</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/5-lateral-movement/evil-winrm</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/5-lateral-movement/wmiexec</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/5-lateral-movement/psexec</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/5-lateral-movement/smbserver</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation/winpeas</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation/sebackupprivilege</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation/powershell-history</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation/powerupps1</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation/reg</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/6-privilege-escalation/rlwrap</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/7-tunneling-and-pivoting</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/7-tunneling-and-pivoting/tunneling-and-pivoting</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/7-tunneling-and-pivoting/chisel</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/8-os-environment</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/8-os-environment/windows</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/8-os-environment/windows/inetpub</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/8-os-environment/windows/powershell-commands</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url><url><loc>https://hacking.ac/docs/untitled-section/8-os-environment/linux</loc><changefreq>daily</changefreq><priority>0.8</priority><lastmod>2026-01-07T07:20:12.459Z</lastmod></url></urlset>